Browse Results

Showing 12,276 through 12,300 of 53,546 results

Algorithmic Aspects in Information and Management: 13th International Conference, AAIM 2019, Beijing, China, August 6–8, 2019, Proceedings (Lecture Notes in Computer Science #11640)

by Ding-Zhu Du Lian Li Xiaoming Sun Jialin Zhang

This volume constitutes the proceedings of the 13th International Conference on Algorithmic Aspects in Information and Management, AAIM 2019, held in Bejing, China in August 2019. The 31 full papers presented were carefully reviewed and selected. The papers deal with most aspects of theoretical computer science and their applications. Special considerations are given to algorithmic research that is motivated by real-world applications.

Theoretical Computer Science

by Dingzhu Du Lian Li En Zhu Kun He

The satisfiability (SAT) problem is central in mathematical logic, computing theory, and many industrial applications. There has been a strong relationship between the theory, the algorithms, and the applications of the SAT problem. This book aims to bring together work by the best theorists, algorithmists, and practitioners working on the SAT problem and on industrial applications, as well as to enhance the interaction between the three research groups. The book features the application of theoretical/algorithmic results to practical problems and presents practical problems for theoretical/algorithmic study. Major topics covered in the book include practical and industrial SAT problems and benchmarks, significant case studies and applications of the SAT problem and SAT algorithms, new algorithms and improved techniques for satisfiability testing, specific data structures and implementation details of the SAT algorithms, and the theoretical study of the SAT problem and SAT algorithms. It features: a comprehensive review of SAT research work over the past 25 years; the most recent research results; and a spectrum of algorithmic issues and applications.

Nonlinear Combinatorial Optimization: Algorithms And Applications (Springer Optimization and Its Applications #147)

by Ding-Zhu Du Panos M. Pardalos Zhao Zhang

Graduate students and researchers in applied mathematics, optimization, engineering, computer science, and management science will find this book a useful reference which provides an introduction to applications and fundamental theories in nonlinear combinatorial optimization. Nonlinear combinatorial optimization is a new research area within combinatorial optimization and includes numerous applications to technological developments, such as wireless communication, cloud computing, data science, and social networks. Theoretical developments including discrete Newton methods, primal-dual methods with convex relaxation, submodular optimization, discrete DC program, along with several applications are discussed and explored in this book through articles by leading experts.

Network Security

by Ding-Zhu Du Scott C.-H. Huang David Maccallum

This book provides a reference tool for the increasing number of scientists whose research is more or less involved in network security. Coverage includes network design and modeling, network management, data management, security and applications.

Complexity and Approximation: In Memory of Ker-I Ko (Lecture Notes in Computer Science #12000)

by Ding-Zhu Du Jie Wang

This Festschrift is in honor of Ker-I Ko, Professor in the Stony Brook University, USA. Ker-I Ko was one of the founding fathers of computational complexity over real numbers and analysis. He and Harvey Friedman devised a theoretical model for real number computations by extending the computation of Turing machines. He contributed significantly to advancing the theory of structural complexity, especially on polynomial-time isomorphism, instance complexity, and relativization of polynomial-time hierarchy. Ker-I also made many contributions to approximation algorithm theory of combinatorial optimization problems. This volume contains 17 contributions in the area of complexity and approximation. Those articles are authored by researchers over the world, including North America, Europe and Asia. Most of them are co-authors, colleagues, friends, and students of Ker-I Ko.

Mastering SQL Queries for SAP Business One

by Gordon Du

This is a practical guide providing comprehensive solutions for SQL query problems, and is full of concrete real-world examples to help you create and troubleshoot your SQL queries in SAP Business One. If you are a system administrator who uses SQL query as your tool of choice for solving specific problems throughout SAP Business One, then this book is for you. It may also be useful if you are a developer or consultant using this technology, and can benefit end users by improving your search for important business information. A rudimentary knowledge of SAP Business One and SQL Server is required to use this book efficiently. Examples covered are relevant to SBO 2007A users, for which the 8.8 release is mostly compatible. All SQL query examples within the book are verified under SQL Server 2005, so they are guaranteed to run under this release, in addition to SQL Server 2008. Non-SAP Business One users can also gain knowledge from the many examples throughout the book. It is hard to find another book with so many SQL query examples.

Non-native English-speaking Engineers’ Writing at the Workplace

by Juan Du

Based on 55 semi-structured in-depth interviews, this book investigates 15 high-tech engineering co-op professionals’ writing experience in the workplace. It shows how the digital age has had a marked impact on the engineers’ methods of communication at work, and how on-the -job writing has affected engineers’ technical competence, shaped their professional identities, challenged their views on Chinese and English writing, and hindered their success in the workplace. The book identifies three aspects of writing practice: engineers’ linguistic and literacy challenges, the reasons behind these challenges, and coping strategies, which suggest that engineers are underprepared and lack necessary support in the workplace. Lastly, the study shows that engineers need to engage in technical literacy through on-the-job writing so that they can fully deal with workplace discourse and socialize with diverse professional groups.Since the sample group interviewed in this book is engineers who studied at universities in the United States and have a foot in the world of school and work as well as knowledge of both Eastern and Western cultures, the book appeals to teachers, students, engineers and scientists who are interested in scientific and technological writing. It is also valuable for educators who prepare scientists, engineers, and technical communicators for professional roles, as well as for communication practitioners who work with engineers.

Cooperation and Integration in 6G Heterogeneous Networks: Resource Allocation and Networking (Wireless Networks)

by Jun Du Chunxiao Jiang

To provide ubiquitous and various services, 6G networks tend to be more comprehensive and multidimensional by integrating current terrestrial networks with space-/air-based information networks and marine information networks; then, heterogeneous network resources, as well as different types of users and data, will be also integrated. Driven by the exponentially growing demands of multimedia data traffic and computation-heavy applications, 6G heterogenous networks are expected to achieve a high QoS with ultra-reliability and low latency. In response, resource allocation has been considered an important factor that can improve 6G performance directly by configuring heterogeneous communication, computing and caching resources effectively and efficiently. The book addresses a range of technical issues in cooperative resource allocation and information sharing for the future 6G heterogenous networks, from the terrestrial ultra-dense networks and space-based networks to the integrated satellite-terrestrial networks, as well as introducing the effects of cooperative behavior among mobile users on increasing capacity, trustworthiness and privacy. For the cooperative transmission in heterogeneous networks, the authors commence with the traffic offloading problems in terrestrial ultra-dense networks, and the cognitive and cooperative mechanisms in heterogeneous space-based networks, the stability analysis of which is also provided. Moreover, for the cooperative transmission in integrated satellite-terrestrial networks, the authors present a pair of dynamic and adaptive resource allocation strategies for traffic offloading, cooperative beamforming and traffic prediction based cooperative transmission. Later, the authors discuss the cooperative computation and caching resource allocation in heterogeneous networks, with the highlight of providing our current studies on the game theory, auction theory and deep reinforcement learning based approaches. Meanwhile, the authors introduce the cooperative resource and information sharing among users, in which capacity oriented-, trustworthiness oriented-, and privacy oriented cooperative mechanisms are investigated. Finally, the conclusion is drawn.

Machine Learning and Autonomous Systems: Proceedings of ICMLAS 2021 (Smart Innovation, Systems and Technologies #269)

by Ke-Lin Du Joy Iong-Zong Chen Haoxiang Wang V. Suma

This book involves a collection of selected papers presented at International Conference on Machine Learning and Autonomous Systems (ICMLAS 2021), held in Tamil Nadu, India, during 24–25 September 2021. It includes novel and innovative work from experts, practitioners, scientists and decision-makers from academia and industry. It covers selected papers in the area of emerging modern mobile robotic systems and intelligent information systems and autonomous systems in agriculture, health care, education, military and industries.

Proceedings of Second International Conference on Sustainable Expert Systems: ICSES 2021 (Lecture Notes in Networks and Systems #351)

by Ke-Lin Du Subarna Shakya Wang Haoxiang

This book features high-quality research papers presented at the 2nd International Conference on Sustainable Expert Systems (ICSES 2021), held in Nepal during September 17–18, 2021. The book focusses on the research information related to artificial intelligence, sustainability, and expert systems applied in almost all the areas of industries, government sectors, and educational institutions worldwide. The main thrust of the book is to publish the conference papers that deal with the design, implementation, development, testing, and management of intelligent and sustainable expert systems and also to provide both theoretical and practical guidelines for the deployment of these systems.

Neural Networks and Statistical Learning

by Ke-Lin Du M. N. Swamy

This book provides a broad yet detailed introduction to neural networks and machine learning in a statistical framework. A single, comprehensive resource for study and further research, it explores the major popular neural network models and statistical learning approaches with examples and exercises and allows readers to gain a practical working understanding of the content. This updated new edition presents recently published results and includes six new chapters that correspond to the recent advances in computational learning theory, sparse coding, deep learning, big data and cloud computing.Each chapter features state-of-the-art descriptions and significant research findings. The topics covered include:• multilayer perceptron;• the Hopfield network;• associative memory models;• clustering models and algorithms;• t he radial basis function network;• recurrent neural networks;• nonnegative matrix factorization;• independent component analysis;•probabilistic and Bayesian networks; and• fuzzy sets and logic.Focusing on the prominent accomplishments and their practical aspects, this book provides academic and technical staff, as well as graduate students and researchers with a solid foundation and comprehensive reference on the fields of neural networks, pattern recognition, signal processing, and machine learning.

Neural Networks and Statistical Learning

by Ke-Lin Du M. N. S. Swamy

Providing a broad but in-depth introduction to neural network and machine learning in a statistical framework, this book provides a single, comprehensive resource for study and further research. All the major popular neural network models and statistical learning approaches are covered with examples and exercises in every chapter to develop a practical working understanding of the content. Each of the twenty-five chapters includes state-of-the-art descriptions and important research results on the respective topics. The broad coverage includes the multilayer perceptron, the Hopfield network, associative memory models, clustering models and algorithms, the radial basis function network, recurrent neural networks, principal component analysis, nonnegative matrix factorization, independent component analysis, discriminant analysis, support vector machines, kernel methods, reinforcement learning, probabilistic and Bayesian networks, data fusion and ensemble learning, fuzzy sets and logic, neurofuzzy models, hardware implementations, and some machine learning topics. Applications to biometric/bioinformatics and data mining are also included. Focusing on the prominent accomplishments and their practical aspects, academic and technical staff, graduate students and researchers will find that this provides a solid foundation and encompassing reference for the fields of neural networks, pattern recognition, signal processing, machine learning, computational intelligence, and data mining.

Autonomous Vehicle Technology: Global Exploration and Chinese Practice (Unmanned System Technologies)

by Mingfang Du

The subject of this book is artificial intelligence (AI), introducing the fast road sensing algorithm and system based on image pattern recognition for unmanned vehicle, especially for traffic sign recognition and complex road recognition. With rich figures and credible data, this book systematically and comprehensively describes the core technology and industrialization focus of today's unmanned vehicle system, which can be used as a reference for R & D Engineers and industrialization practitioners of unmanned vehicle, and it can also be used as a teaching material for higher grades and postgraduates in colleges and universities.

The Creativity Code: Art and Innovation in the Age of AI

by Marcus Du Sautoy

Most books on AI focus on the future of work. But now that algorithms can learn and adapt, does the future of creativity also belong to well-programmed machines? To answer this question, Marcus du Sautoy takes us to the forefront of creative new technologies and offers a more positive and unexpected vision of our future cohabitation with machines.

Thinking Better: The Art of the Shortcut in Math and Life

by Marcus du Sautoy

One of the world's great mathematicians shows why math is the ultimate timesaver—and how everyone can make their lives easier with a few simple shortcuts.We are often told that hard work is the key to success. But success isn&’t about hard work – it&’s about shortcuts. Shortcuts allow us to solve one problem quickly so that we can tackle an even bigger one. They make us capable of doing great things. And according to Marcus du Sautoy, math is the very art of the shortcut.Thinking Better is a celebration of how math lets us do more with less. Du Sautoy explores how diagramming revolutionized therapy, why calculus is the greatest shortcut ever invented, whether you must really practice for ten thousand hours to become a concert violinist, and why shortcuts give us an advantage over even the most powerful AI. Throughout, we meet artists, scientists, and entrepreneurs who use mathematical shortcuts to change the world.Delightful, illuminating, and above all practical, Thinking Better is for anyone who has wondered why you should waste time climbing the mountain when you could go around it much faster.

Security Assessment in Vehicular Networks

by Suguo Du Haojin Zhu

This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential countermeasures which could mitigate the system. By considering rational participants that aim to maximize their payoff function, the brief describes a game-theoretic analysis approach to investigate the possible strategies that the security administrator and the attacker could adopt. A phased attack-defense game allows the reader to model the interactions between the attacker and defender for VANET security assessment. The brief offers a variety of methods for assessing the security of wireless networks. Professionals and researchers working on the defense of VANETs will find this material valuable.

Informatics and Management Science I: 204 (Lecture Notes in Electrical Engineering)

by Wenjiang Du

The International Conference on Informatics and Management Science (IMS) 2012 will be held on November 16-19, 2012, in Chongqing, China, which is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang TThe International Conference on Informatics and Management Science (IMS) 2012 will be held on November 16-19, 2012, in Chongqing, China, which is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, University of Michigan, Chongqing University of Arts and Sciences, and sponsored by National Natural Science Foundation of China (NSFC). The objective of IMS 2012 is to facilitate an exchange of information on best practices for the latest research advances in a range of areas. Informatics and Management Science contains over 600 contributions to suggest and inspire solutions and methods drawing from multiple disciplines including:<P><P> Computer Science<P> Communications and Electrical Engineering<P> Management Science<P> Service Science<P> Business Intelligence<P> Management Science<P> Service Science<P> Business Intelligence<P> echnological University, University of Michigan, Chongqing University of Arts and Sciences, and sponsored by National Natural Science Foundation of China (NSFC). The objective of IMS 2012 is to facilitate an exchange of information on best practices for the latest research advances in a range of areas. Informatics and Management Science contains over 600 contributions to suggest and inspire solutions and methods drawing from multiple disciplines including: Computer Science Communications and Electrical Engineering Management Science Service Science Business Intelligence

Informatics and Management Science II: 205 (Lecture Notes in Electrical Engineering)

by Wenjiang Du

The International Conference on Informatics and Management Science (IMS) 2012 will be held on November 16-19, 2012, in Chongqing, China, which is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, University of Michigan, Chongqing University of Arts and Sciences, and sponsored by National Natural Science Foundation of China (NSFC). The objective of IMS 2012 is to facilitate an exchange of information on best practices for the latest research advances in a range of areas. Informatics and Management Science contains over 600 contributions to suggest and inspire solutions and methods drawing from multiple disciplines including:<P><P> Computer Science<P> Communications and Electrical Engineering<P> Management Science<P> Service Science<P> Business Intelligence<P> Management Science<P> Service Science<P> Business Intelligence<P>

Informatics and Management Science III: 206 (Lecture Notes in Electrical Engineering)

by Wenjiang Du

The International Conference on Informatics and Management Science (IMS) 2012 will be held on November 16-19, 2012, in Chongqing, China, which is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, University of Michigan, Chongqing University of Arts and Sciences, and sponsored by National Natural Science Foundation of China (NSFC). The objective of IMS 2012 is to facilitate an exchange of information on best practices for the latest research advances in a range of areas. Informatics and Management Science contains over 600 contributions to suggest and inspire solutions and methods drawing from multiple disciplines including:<P><P> Computer Science<P> Communications and Electrical Engineering<P> Management Science<P> Service Science<P> Business Intelligence<P> Management Science<P> Service Science<P> Business Intelligence<P>

Informatics and Management Science IV: 207 (Lecture Notes in Electrical Engineering)

by Wenjiang Du

The International Conference on Informatics and Management Science (IMS) 2012 will be held on November 16-19, 2012, in Chongqing, China, which is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, University of Michigan, Chongqing University of Arts and Sciences, and sponsored by National Natural Science Foundation of China (NSFC). The objective of IMS 2012 is to facilitate an exchange of information on best practices for the latest research advances in a range of areas. Informatics and Management Science contains over 600 contributions to suggest and inspire solutions and methods drawing from multiple disciplines including:<P><P> Computer Science<P> Communications and Electrical Engineering<P> Management Science<P> Service Science<P> Business Intelligence<P> Management Science<P> Service Science<P> Business Intelligence<P>

Informatics and Management Science V

by Wenjiang Du

The International Conference on Informatics and Management Science (IMS) 2012 will be held on November 16-19, 2012, in Chongqing, China, which is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, University of Michigan, Chongqing University of Arts and Sciences, and sponsored by National Natural Science Foundation of China (NSFC). The objective of IMS 2012 is to facilitate an exchange of information on best practices for the latest research advances in a range of areas. Informatics and Management Science contains over 600 contributions to suggest and inspire solutions and methods drawing from multiple disciplines including: Computer Science Communications and Electrical Engineering Management Science Service Science Business Intelligence

Informatics and Management Science V: 208 (Lecture Notes in Electrical Engineering)

by Wenjiang Du

The International Conference on Informatics and Management Science (IMS) 2012 will be held on November 16-19, 2012, in Chongqing, China, which is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, University of Michigan, Chongqing University of Arts and Sciences, and sponsored by National Natural Science Foundation of China (NSFC). The objective of IMS 2012 is to facilitate an exchange of information on best practices for the latest research advances in a range of areas. Informatics and Management Science contains over 600 contributions to suggest and inspire solutions and methods drawing from multiple disciplines including:<P><P> Computer Science<P> Communications and Electrical Engineering<P> Management Science<P> Service Science<P> Business Intelligence<P> Management Science<P> Service Science<P> Business Intelligence<P>

Computer Security: A Hands-on Approach

by Wenliang Du

This book is a part of another book titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition" (687 pages). It is created to lower the cost on students, as many courses only need this part. It covers 17 of the 26 chapters. This book is based on the author's 18 years of teaching and research experience. It covers the fundamental principles in Computer Security, including software security, hardware security, web security, and cryptography. Its goal is to help readers understand how various attacks work, what their fundamental causes are, how to defend against them, and how various defense mechanisms work. The book can be used as a textbook for undergraduate and graduate courses. The author strongly believes in "learning by doing", so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). Readers can learn better from such hands-on activities. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries.

Computer Security: A Hands-on Approach

by Wenliang Du

Teaching computer security principles via hands-on activities. <p><p> Unique among computer security texts, this book, in its third edition, builds on the author’s long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can "touch," play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.

Internet Security: A Hands-on Approach

by Wenliang Du

Teaching Internet security principles via hands-on activities. <p><p>Unique among computer security texts, this book, in its third edition, builds on the author’s long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can touch, play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.

Refine Search

Showing 12,276 through 12,300 of 53,546 results